COMPUTERS/INTERNET/SECURITY | WHAT REALLY HAPPENED


COMPUTERS/INTERNET/SECURITY

Jan 31 10:21

10 kits for teaching yourself about computers

This kit comes with common electrical components so that users of varying experience levels can create their own projects. It also has diagrams to help get beginners started. Online resources are also available. The kit costs $49.95.

Webmaster's Commentary: 

These are cool!

Jan 31 10:21

British securocrats try to sneak in Snooper’s Charter yet again

Earlier this month, four U.K. lords tried to sneak the text of a rejected piece of legislation popularly known as the Snooper’s Charter into a new anti-terror bill. After debate in the House of Lords produced heavy pushback, the peers withdrew the amendments that would have brought the surveillance law in by the back door.

And now, incredibly, they’re trying it again just days later. On Saturday, ahead of a “report stage” debate on Monday (the Counter-Terrorism and Security Bill is almost fully baked), Lords West, Blair, Carlile and King introduced a new amendment that appears to be nearly identical to the last, and to the Communications Data Bill before it.

Again, this new amendment would force “telecommunications operators” – which these days includes the likes of Facebook and Skype, as well as traditional telcos – to store communications metadata for up to a year and hand it over to U.K. authorities when requested.

Jan 31 10:16

UK: Army sets up new psychological operations and social media brigade

The Army is setting up a new unit that will use psychological operations and social media to help fight wars "in the information age". Head of the Army General Sir Nick Carter said the move was about trying to operate "smarter". The 77th Brigade, made up of reservists and regular troops and based in Hermitage, Berkshire, will be formally created in April.

Jan 31 10:04

Smartphones will begin categorizing users' mental health; gun seizures will follow

The Digital Age has produced some remarkable technology and will continue to do so, but as each new innovation springs forth, more of us are finding that we are not as comfortable with it as we once thought we might be.

One of the latest examples comes from a new iPhone app that appears capable of gauging one's mental health -- though how accurately it can do so remains questionable, as does what authorities might do with such information.

Jan 31 08:22

Without broadband under Title II, Verizon will get off scot-free for ‘supercookies’

Revelations this week that Verizon Wireless secretly used “supercookies” to track customers’ browsing habits underlines a less-talked about benefit of the FCC’s potential reclassification of broadband as a Title II public utility — consumer privacy protection.

With broadband defined as a Title I “information service” as it is today, the FCC lacks the legal language and authority to punish carriers for things like “supercookies.”

Jan 31 07:39

The Coming Biological Infowar: US Proposes DNA Database

Tony Cartalucci
Activist Post

The US is proposing a government-backed DNA database composed of over a million volunteers' genetic material.

While this initial database is composed of volunteers, involuntary blood samples are already collected by US law enforcement agencies around the country and amassed in an existing, and ever-expanding network. Additionally, the new proposal seeks to establish "precision medicine" as a standard in medical care, implying that everyone's DNA will eventually be required by medical practitioners to administer increasingly state-run healthcare...

Jan 30 22:32

Hidden in plain sight (revisited)

Jan 30 16:08

Obama must finally end NSA phone record collection, says privacy board

White House could take action ‘at any time’, says Privacy and Civil Liberties Oversight Board chair as key Patriot Act measure is poised to expire

Jan 30 15:40

Huge Security Flaw Leaks VPN Users’ Real IP-Addresses

VPN users are facing a massive security flaw as websites can easily see their home IP-addresses through WebRTC. The vulnerability is limited to supporting browsers such as Firefox and Chrome, and appears to affect Windows users only. Luckily the security hole is relatively easy to fix.

Jan 30 15:30

The dark nexus of mind control and artificial intelligence

In researching the MK ULTRA programs and their various offshoots, I came across an interesting connection to the coming SmartGrid

Jan 30 12:19

My Songs Got 151,781 Plays on YouTube. I Received $10…

By the end of 2013 YouTube made their agreement with Swiss copyright society SUISA and thus finally became open to Swiss authors. By the end of January 2014 I was a YouTube partner and started uploading all my content and my so far 28 videos. But above all I was able to monetize the many third party uploads of my music. Or so I thought because it soon became clear that all my views added to next to nothing in my income reports.

Jan 30 10:26

Companies now chipping employees with subdermal implants, the ‘mark of the beast’ has arrived

New technologically advanced building wired to accommodate subdermal implants under employees skin

Jan 30 08:44

If Obama Gets His Way, Sharing This Story Will Soon Be a Felony

Inaction, he said, would leave the country "vulnerable" to attacks like the one launched against Sony Pictures Entertainment. Only by adopting this new language, Obama said, could Congress "continue to protect the technologies that have unleashed untold opportunities for people around the globe."

But the broad laws he proposed would not simply target shadowy foreign hackers. American bloggers and media companies would also be subject to felony cybercrime charges for disseminating hacked material. The statute would apply to normal Internet users too: If you, dear reader, saw the "bad passwords" article and passed it along to a friend over email, or posted the link to Reddit, or retweeted the article, or shared it on Facebook, then you too could face federal prosecution for "willfully" trafficking "in any password or similar information."

Jan 30 08:40

Section 215 of the Patriot Act Expires in June. Is Congress Ready?

Nadia Kayyali
Activist Post

You may have heard that the Patriot Act is set to expire soon. That’s not quite the case. The Patriot Act was a large bill, as were the reauthorizations that followed in 2005 and 2006. Not all of it sunsets. But three provisions do expire on June 1st: Section 215, the "Lone Wolf provision," and the "roving wiretap" provision.

All of these sections are concerning, but Section 215 takes the cake. It’s the authority that the NSA, with the FBI’s help, has interpreted to allow the U.S. government to vacuum up the call records of millions of innocent people. It’s also been the focus of most of the NSA reform efforts in Congress over the last year and a half. But if there were ever a time to reform the NSA, it’s now—because a vote for reauthorization, without comprehensive reform of NSA spying, will very clearly be a vote against the Constitution...

Jan 30 08:11

EU PLAN TO INSTALL A TRACKING COMPUTER IN EVERY CAR TO TAX MILES

A Senior European politician has caused outrage by calling for computers to be fitted in all European cars as part of an EU wide road pricing system. Transport Commissioner Violeta Bulc said the current system which is decided by national parliaments was “a burden on car drivers and an obstacle to their mobility” she told German newspaper ‘World on Sunday’.

Jan 30 07:55

Social Media Giants Adopt ''Mob Rule'' Tactics

Janet Phelan
Activist Post

The recent decisions by social media giants Facebook and LinkedIn to adopt user crowd-censoring strategies may be less than benevolent.

According to its recent announcement, Facebook will employ an algorithm, based ostensibly on the numbers of user-generated flags, to reduce or mitigate the distribution of stories flagged as “false.” In addition, Facebook has announced that stories flagged in this manner will contain notice that the story has been determined to contain false information...

Jan 29 16:04

Canada monitors 15 million file downloads a day

The information disclosed by the former US National Security Agency (NSA) contractor, Edward Snowden, shows that Canada’s electronic spy agency monitors file downloads all around the world.

Jan 29 15:56

US tech firms ask China to postpone 'intrusive' rules

US business groups are seeking "urgent discussions" over new Chinese rules requiring foreign firms to hand over source code and other measures.

The groups wrote to senior government officials after the introduction of the cybersecurity regulations at the end of last year.

The US Chamber of Commerce and other groups called the rules "intrusive".

The regulations initially apply to firms selling products to Chinese banks but are part of a wider review.

Jan 29 15:54

SAVE Act Passes in House, Comes One Step Closer to Unnecessarily Chilling Online Speech

The SAVE Act would create new federal criminal liability for Internet intermediaries who publish or host third-party advertising content that relates to commercial sexual exploitation.

Jan 29 15:52

Politicians are supporting Comcast's TWC merger with letters ghostwritten by Comcast

"When Comcast makes a promise to act, it is comforting to know that they will always follow through," Wood's letter explained. "This is the type of attitude that makes Roswell proud to be involved with such a company," the letter asserts, "our residents are happy with the services it has provided and continues to provide each day.”

Yet Wood’s letter made one key omission: Neither Wood nor anyone representing Roswell’s residents wrote his letter to the FCC. Instead, a vice president of external affairs at Comcast authored the missive word for word in Mayor Wood's voice.

Jan 29 15:46

FCC Officially Redefines Broadband As 25 Mbps Down, 3 Mbps Up

It's a change the broadband industry and friends aren't happy with, because it will only further highlight the fact that a lack of competition has left large portions of the country with pricey and slow broadband service.

Jan 29 13:49

SWEDISH BUSINESS OFFICE IMPLANTS RFID CHIPS UNDER STAFF’S SKIN

Want to gain entry to your office, get on a bus, or perhaps buy a sandwich? We're all getting used to swiping a card to do all these things. But at Epicenter, a new hi-tech office block in Sweden, they are trying a different approach - a chip under the skin. Felicio de Costa, whose company is one of the tenants, arrives at the front door and holds his hand against it to gain entry. Inside he does the same thing to get into the office space he rents, and he can also wave his hand to operate the photocopier.

Jan 29 12:26

FLASHBACK - NSA’s ANT Division Catalog of Exploits for Nearly Every Major Software/Hardware/Firmware

After years of speculation that electronics can be accessed by intelligence agencies through a back door, an internal NSA catalog reveals that such methods already exist for numerous end-user devices.

When it comes to modern firewalls for corporate computer networks, the world’s second largest network equipment manufacturer doesn’t skimp on praising its own work. According to Juniper Networks’ online PR copy, the company’s products are “ideal” for protecting large companies and computing centers from unwanted access from outside. They claim the performance of the company’s special computers is “unmatched” and their firewalls are the “best-in-class.” Despite these assurances, though, there is one attacker none of these products can fend off — the United States’ National Security Agency.

Webmaster's Commentary: 

And all of this is not only a violation of the Bill of Rights, but a colossal waste of time and money, as anyone with a modicum of programming experience can devise codes the NSA cannot break.

Jan 29 12:23

FLASHBACK - N.S.A. Devises Radio Pathway Into Computers

The National Security Agency has implanted software in nearly 100,000 computers around the world that allows the United States to conduct surveillance on those machines and can also create a digital highway for launching cyberattacks.

While most of the software is inserted by gaining access to computer networks, the N.S.A. has increasingly made use of a secret technology that enables it to enter and alter data in computers even if they are not connected to the Internet, according to N.S.A. documents, computer experts and American officials.

Jan 29 09:44

Snowden files show Canada spy agency runs global Internet watch

Canada's electronic spy agency has been intercepting and analyzing data on up to 15 million file downloads daily as part of a global surveillance program, according to a report published on Wednesday.

Critics said the revelations, made in 2012 documents obtained by former U.S. spy agency contractor Edward Snowden and leaked to journalists, showed much more oversight was needed over Canada's Communications Security Establishment (CSE).

Jan 29 09:22

YouTube swamped with videos, hard to filter out all terror-related content - Google

Google says that, with some 300 hours of video materials uploaded to YouTube each minute, it is virtually impossible to block all terror-related content from the platform.

Webmaster's Commentary: 

But they can filter out all the videos that question Sandy Hook! :)

Jan 29 08:02

Researchers Seek to Track Mental Health Through Social Media

Joe Wright
Activist Post

The Feds have made their intentions known about conducting surveillance on a range of social media platforms covering everything from political speech, activist assembly, and even health. In tandem with corporate data harvesters, open public forums like Twitter and Facebook can provide a wealth of knowledge about general behavior, as well as real-time monitoring of activities.

Troubling new research from the University of Rochester aims to go a step further: turning "any computer or smartphone with a camera into a personal mental health monitoring device." ...

Jan 29 07:57

No, Department of Justice, 80 Percent of Tor Traffic Is Not Child Porn

“Tor obviously was created with good intentions, but it’s a huge problem for law enforcement,” Caldwell said in comments reported by Motherboard and confirmed to me by others who attended the conference. “We understand 80 percent of traffic on the Tor network involves child pornography.”

That statistic is horrifying. It’s also baloney.

In a series of tweets that followed Caldwell’s statement, a Department of Justice flack said Caldwell was citing a University of Portsmouth study WIRED covered in December. He included a link to our story. But I made clear at the time that the study claimed 80 percent of traffic to Tor hidden services related to child pornography, not 80 percent of all Tor traffic.

That is a huge, and important, distinction.

Jan 29 05:08

Google Under Fire

Jan 28 16:01

YouTube staff too swamped to filter out all terror-related content

YET FOR SOME REASON IT HAS THE TIME TO BLOCK ALL WARS ARE BANKERS’ WARS every chance it gets!?

Jan 28 14:32

Univ. of Penn Offers “Wasting Time on the Internet” Class Taught by “Robotic Erotica” Professor

The University of Pennyslvania is now offering a “Wasting Time on the Internet” class that will earn students credit.

The class, literally named “Wasting Time on the Internet,” is being taught by Professor Kenneth Goldsmith this Spring 2015 semester. In 2010, Professor Goldsmith also taught “Uncreative Writing: Robotic Erotica/Erotic Robotics: Scribing a Non-Expresssive [sic] Sexuality.”

Goldsmith writes for his new class that “students will be required to stare at the screen for three hours, only interacting through chat rooms, bots, social media and listservs.

“Distraction, multi-tasking, and aimless drifting is mandatory,” the description adds.

Webmaster's Commentary: 

And just what career path does this prepare you for?

(I already qualify for a PhD in this subject.)

Jan 28 13:36

Anonymous Shuts Down Texas Town’s Website to Protest Killing of Teen Girl By Cops

Following a controversial Longview, TX incident in which three police officers fatally shot a 17-year-old girl who reportedly brandished a knife at a police station in what her aunt described as a cry for help, Anonymous has taken credit for briefly crashing the City of Longview's website in an act of retaliation.

Jan 28 09:40

Revealed: Canadian spy program illustrates “giant x-ray machine over all our digital lives”

Latest revelation from Snowden archive shows CSE has been monitoring, analyzing, and tracking millions of people who utilize popular file-sharing websites

Jan 28 08:33

YOUTUBE CENSORING VIDEOS AGAIN! Anwar Al Awlaki Terrorist? Or Pentagon / CIA Asset? YOU MAKE THE CALL!

Jan 28 08:30

Severe “Ghost” flaw leaves Linux systems vulnerable to takeover

A serious vulnerability in a key Linux library could let attackers take complete control of systems, such as servers, that are based on the open-source operating system. Those running Linux systems are advised to download a patch for their distribution immediately.

Jan 28 08:25

THE FBI’S PLAN TO COLLECT EVERYONE’S DNA JUST GOT A HUGE BOOST FROM CONGRESS

In 2011, 1 in 25 Americans was arrested. In a few years, if the FBI has its way, the federal government will possess the DNA of all of those people and more. Under the radar of most lawmakers and journalists, the Bureau—with private industry and congress’ help—is pushing the most massive expansion of biometric state surveillance since the invention of the fingerprint.

Jan 28 08:23

CSE tracks millions of downloads daily: Snowden documents

Under Levitation, analysts with the electronic eavesdropping service can access information on about 10 to 15 million uploads and downloads of files from free websites each day, the document says.

Jan 28 07:59

Online army: Ukraine seeks to recruit bloggers for ‘truth-telling’ crusade

Kiev authorities plan to create a coordination center for Ukrainian bloggers to present a united front in social media, said Information Policy Minister, Yury Stets, adding that popular bloggers will become Ukraine’s “truth-telling” online army.

Webmaster's Commentary: 

You don't need to organize people to tell the truth. You only need to organize them to tell lies.

Jan 27 18:20

DHS to Launch Iris and Facial Recognition at the Border

The Department of Homeland Security this summer plans to roll out iris and facial recognition services to the U.S. Border Patrol, according to DHS officials. The service will be able to share images with the FBI's massive multibiometric system, officials said.

Jan 27 17:49

French president’s Holocaust day speech presages crackdown on Palestine supporters

The planned crackdown raises concern that French authorities will use their powers to further censor speech critical of Israel under the guise of combating anti-Semitism

The problem is that Israel and its advocates have tried for years to blur the line between anti-Semitism – bigotry against Jews because they are Jews – on the one hand, and, on the other, criticism of Israel’s colonial occupation, massacres and violence against Palestinians.

Jan 27 16:36

Montana Lawmaker Wants to Protect Journalists From Government Snooping

A bill introduced in Montana’s House Judiciary Committee would bar state government agencies from accessing digital servers to get reporters’ notes.

Jan 27 16:18

Facebook admits censoring posts and comments about political corruption

The social media giant, Facebook, is currently censoring certain postings and comments by members in countries that object to certain content, the latest being Turkey. A Turkish high court ruled that members' posts and comments on insult the Prophet Muhammad and are offensive to followers of Islam, according to news reports on Monday.

Jan 27 15:47

Secret ‘BADASS’ Intelligence Program Spied on Smartphones

British and Canadian spy agencies accumulated sensitive data on smartphone users, including location, app preferences, and unique device identifiers, by piggybacking on ubiquitous software from advertising and analytics companies, according to a document obtained by NSA whistleblower Edward Snowden.

Jan 27 13:45

YOUR APPLIANCES MAY BE SPYING ON YOU

Connecting everyday products like refrigerators, baby monitors and watches to the Internet is giving companies and hackers unprecedented access to private information, the Federal Trade Commission warned in a report Tuesday. The "Internet of Things," the term for the growing universe of Internet-connected devices, can lead to significant improvements in our lives, the FTC wrote. But the connected devices could also undermine our security and privacy if companies aren't careful, the agency warned.

Jan 27 13:14

Police State: Your Home Appliances Will Soon Be Remotely Controlled by the Government

The latest encroachment on our privacy and daily actions comes in the form of what is being called “smart grid” technology.

UK utility company Northern Powergrid Holdings Co. (which is owned by mega-billionaire Warren Buffett) is cooperating with Siemens AG towards a planned test of a smart grid which will be able, according to Bloomberg.com, “to control when consumer appliances will be used in the home.

Jan 27 11:05

Source Code Similarities: Experts Unmask 'Regin' Trojan as NSA Tool

Just weeks ago, SPIEGEL published the source code of an NSA malware program known internally as QWERTY. Now, experts have found that it is none other than the notorious trojan Regin, used in dozens of cyber attacks around the world.

Jan 27 10:59

TSA could start snooping on social media to speed up security screenings

The Transportation Security Agency is already well known for conducting evasive searches at American airports, but new measures may soon see the social media accounts of potential passengers being screened by TSA.

Jan 27 07:44

“Technological Arms Race” Has Captured Global Finance: “Trading Once Took Minutes, Now Handled in Mere Nanoseconds by Computers”

As it becomes increasingly clear that fewer and fewer hands control the wealth of the planet, the manipulation of the market seems obvious enough.

Jan 27 07:27

Alternative Media future and risk

The political messages and agenda for acceptable discourse are provided through filtered lenses presented as establishment news

Jan 27 07:26

Piracy site Popcorn Time almost as popular as Netflix

Piracy site Popcorn Time almost as popular as Netflix (*in Netherlands)

The illegal video service, of which the managers are unknown, offers all brand new TV series and feature films. Popcorn Time also has a slick design and is very user friendly. Its range is much larger than legal variants like Netflix and HBO. These American services have to negotiate with film companies to be able to offer the latest titles. Popcorn Time is also free, which the other two aren’t.

(* https://popcorntime.io/ )

Jan 27 03:15

Sheriffs want popular police-tracking app disabled

Sheriffs are campaigning to pressure Google Inc. to turn off a feature on its Waze traffic software that warns drivers when police are nearby. They say one of the technology industry’s most popular mobile apps could put officers’ lives in danger from would-be police killers who can find where their targets are parked.

Jan 26 16:10

Robots are starting to break the law and nobody knows what to do about it

The Random Darknet Shopper, an automated online shopping bot with a budget of $100 a week in Bitcoin, is programmed to do a very specific task: go to one particular marketplace on the Deep Web and make one random purchase a week with the provided allowance. The purchases have all been compiled for an art show in Zurich, Switzerland titled The Darknet: From Memes to Onionland, which runs through January 11.

The concept would be all gravy if not for one thing: the programmers came home one day to find a shipment of 10 ecstasy pills, followed by an apparently very legit falsified Hungarian passport– developments which have left some observers of the bot’s blog a little uneasy.

If this bot was shipping to the U.S., asks Forbes contributor and University of Washington law professor contributor Ryan Calo, who would be legally responsible for purchasing the goodies? The coders? Or the bot itself?

Jan 26 15:52

Secret ‘BADASS’ Intelligence Program Spied on Smartphones

British and Canadian spy agencies accumulated sensitive data on smartphone users, including location, app preferences, and unique device identifiers, by piggybacking on ubiquitous software from advertising and analytics companies, according to a document obtained by NSA whistleblower Edward Snowden.

Jan 26 15:40

TSA could start snooping on social media to speed up security screenings

The Transportation Security Agency is already well known for conducting evasive searches at American airports, but new measures may soon see the social media accounts of potential passengers being screened by TSA.

Jan 26 10:08

Mass surveillance is fundamental threat to human rights, says European report

Europe’s top rights body has said mass surveillance practices are a fundamental threat to human rights and violate the right to privacy enshrined in European law.

The parliamentary assembly of the Council of Europe says in a report that it is “deeply concerned” by the “far-reaching, technologically advanced systems” used by the US and UK to collect, store and analyse the data of private citizens. It describes the scale of spying by the US National Security Agency, revealed by Edward Snowden, as “stunning”.

The report also suggests that British laws that give the monitoring agency GCHQ wide-ranging powers are incompatible with the European convention on human rights.

Jan 26 09:14

WikiLeaks Journalists Face Serious Charges After Google Hands Over Information

Three WikiLeaks journalists are facing charges of espionage and conspiracy after Google turned over their confidential data to the U.S. government, WikiLeaks announced on its site Monday morning.

The whistleblower organization now wants an explanation from both Google and the Justice Department.

Jan 26 08:27

Italy launches largest ever pirate site blockade

A complaint filed by 21st Century Fox's Sky TV has ended in Italy's most aggressive site-blocking action yet

Jan 26 08:18

THE TSA WANTS TO READ YOUR FACEBOOK POSTS AND CHECK OUT YOUR PURCHASES BEFORE IT WILL APPROVE YOU FOR PRECHECK

The TSA is disappointed that so few Americans have opted out of its bottle-tossing, package-groping screenings by signing up for its PreCheck program. For a few years now, the TSA has been selling travelers' civil liberties back to them, most recently for $85 a head, but it's now making a serious push to increase participation. The TSA can't do it alone, so it's accepting bids on its PreCheck expansion proposal. (h/t to Amy Alkon)

Jan 26 08:18

The Rebel Website got hacked by fake Muslim hackers

Tonight, the Rebel Website got attacked by hackers claiming to to be fighting for freedom for Palestine and all Muslims. Given the outspoken pro-Palestinian and anti-Jewish positions of the writers of the Rebel Team, I'm more inclined that it's a false-flag operation of the usual suspects. Jew know who...

Webmaster's Commentary: 

WRH got hit with attacks twice yesterday.

Jan 26 08:11

Why You Should Build Your Own Internet

by Brian Berletic

There are a lot of reasons to build your own Internet. In some places, you may have access to the Internet, but not particularly like your service provider or those monitoring and regulating your network. In other places, you may have no Internet (or telecom network) at all.

The solution is not to wait for someone to build the network that meets all your requirements, the answer is to build that network yourself!...

Jan 26 08:09

SHERIFFS WANT POPULAR POLICE-TRACKING WAZE APP DISABLED

Waze, which Google purchased for $966 million in 2013, is a combination of GPS navigation and social networking. Fifty million users in 200 countries turn to the free service for real-time traffic guidance and warnings about nearby congestion, car accidents, speed traps or traffic cameras, construction zones, potholes, stalled vehicles or unsafe weather conditions. To Sergio Kopelev, a reserve deputy sheriff in Southern California, Waze is also a stalking app for law enforcement.

Jan 26 08:00

GOOGLE SECRETLY HANDED OVER WIKILEAKS EMAILS AND PERSONAL DATA TO US GOVERNMENT

In what WikiLeaks called a “serious violation of the privacy and journalistic rights of WikiLeaks’ staff”, Google handed over the information under a secret search warrant issued by a federal judge in 2012. Google then wrote to Wikileaks on Christmas Eve 2014, telling the group that it had complied with an order from the Justice Department to hand over digital data including all email and IP addresses of three WikiLeaks staff members.

Jan 25 23:04

The Future of Freedom: A Feature Interview with NSA Whistleblower William Binney

historic parallels in privacy violations
how the government makes you vulnerable to hackers
retro-active immunity/ex post facto legality

Jan 25 21:40

Police seized 50 servers in Pirate Bay raid

The first major raid on The Pirate Bay took place on May 31 2006 in Stockholm, Sweden

Jan 25 13:30

Hack-Proof Smart Keyboard Learns How You Type, Won’t Work for Anyone Else

Scientists have developed a new keyboard that can protect your computer from direct hacking.

The intelligent keyboard (IKB) uses keystroke dynamics to identify users by the way they type, according to the journal ASC Nano.

By sensing typing patterns such as the speed at which a user types and the amount of pressure applied to the keys, the keyboard can accurately distinguish one user from another and prevent unauthorized users from accessing a computer.

Jan 25 10:20

Facebook Advocates Stasi-Style Snitching & Suppression of Free Speech

Social media site targets gun owners but not child molesters

Jan 25 10:03

Worst passwords of 2014 are just as terrible as you'd think

If the onset of high-profile hackings taught us anything in 2014, it's absolutely nothing.
Password management firm SplashData released its annual list of the worst passwords of the year and it's just as dreadful as you'd think. The company, which analyzed the 3 million passwords leaked online last year, revealed that the most common leaked password in 2014 was "123456," followed by "password" — both topped the list last year, too.

Jan 25 10:02

Secret TPP Negotiations—And Public Protests—To Be Held in New York City

The next round of secret Trans-Pacific Partnership (TPP) negotiations begins this Monday, January 26, and runs through the following week at the Sheraton New York Time Square Hotel in downtown Manhattan.

As with many previous TPP meetings, the public will be shut out of talks as negotiators convene behind closed doors to decide binding rules that could impact how our lawmakers set digital policy in the decades to come. Big content industry interests have been given privileged access to negotiating texts and have driven the US Trade Representative's mandate when it comes to copyright—which is why the TPP carries extreme copyright measures that ignore users' rights.

Jan 25 09:42

No need for speed: Cable industry opposes 25Mbps broadband definition. Normal people don't need 25Mbps down or 3Mbps up, cable lobby says.

The cable lobby is opposed to a Federal Communications Commission plan to define "broadband" as speeds of at least 25Mbps downstream and 3Mbps up.
Customers do just fine with lower speeds, the National Cable & Telecommunications Association (NCTA) wrote in an FCC filing Thursday (thanks to the Washington Post'sBrian Fung for pointing it out). 25Mbps/3Mbps isn't necessary to meet the legal definition of "high-speed, switched, broadband telecommunications capability that enables users to originate and receive high-quality voice, data, graphics, and video telecommunications using any technology," the NCTA said.

Jan 25 09:34

Edward Snowden: Apple iPhone with Secret iFeature Allows Government to Spy on You

"The iPhone has special software that can activate itself without the owner having to press a button and gather information about him; that's why on security grounds he refused to have this phone," Kucherena added.

It is not clear if the "special software" being referred to in the interview is made up of standard diagnostic tools, or if the NSA whistleblower thinks intelligence agencies from the United States have found a way to compromise the mobile operating system developed by Apple.

Jan 25 08:31

Internet filters block websites of sex abuse charities

The adult content filters being rolled out by some internet providers under a scheme championed by David Cameron are blocking the websites of businesses and charities and are a “distraction” for parents seeking to protect children from online pornography, claim campaigners.

Jan 24 11:41

State sponsored cyber-attacks happen more and more often - Kaspersky

At this year's Davos economic forum, the spectre of cyber-terrorism loomed over the luxurious get-together of the world's elite.

Jan 24 11:17

Bill Gates: Get on your knees and beg for your jobs

He might not have said it in so many words, though I wish that he had because only that kind of candor can get Americans to wakeup and do what is necessary to survive this stealth and brutal war, calculated to destroy their lives.

Microsoft cofounder Bill Gates isn’t going to sugarcoat things: The increasing power of automation technology is going to put a lot of people out of work. Business Insider reports that Gates gave a talk at the American Enterprise Institute think tank in Washington, DC this week and said that both governments and businesses need to start preparing for a future where lots of people will be put out of work by software and robots.

Webmaster's Commentary: 

Bill misses a key point. Software and robots do not earn wages to pour back into the economy. Bill's vision of the future is 300 million Americans starving in the streets while the factories and stores are filled with robots standing around with nothing to do!

Jan 24 11:04

How the CIA made Google

INSURGE INTELLIGENCE, a new crowd-funded investigative journalism project, breaks the exclusive story of how the United States intelligence community funded, nurtured and incubated Google as part of a drive to dominate the world through control of information. Seed-funded by the NSA and CIA, Google was merely the first among a plethora of private sector start-ups co-opted by US intelligence to retain ‘information superiority.’

Jan 24 07:38

The Many Problems with the DEA's Bulk Phone Records Collection Program

Hanni Fakhoury
Activist Post

Think mass surveillance is just the wheelhouse of agencies like the NSA? Think again. One of the biggest concerns to come from the revelations about the NSA’s bulk collection of the phone records of millions of innocent Americans was that law enforcement agencies might be doing the same thing.

It turns out this concern was valid, as last week the government let slip for the first time that the Drug Enforcement Agency (DEA) had also been collecting the phone records of Americans in bulk since the 1990s...

Jan 23 18:47

Americans Offer to Take 100 Lashes Each for Saudi Blogger

A bipartisan, multi-religious group of Americans have offered to each take 100 lashes for Saudi Arabian blogger Raif Badawi who was sentenced to 1,000 lashes for insulting Saudi clerics. All those who volunteered are members of the U.S. Commission on International Religious Freedom.

Jan 23 16:37

A 600,000 Cubic Foot Blimp May Be Spying on You

Ted Baumann
Activist Post

In the summer of 1849, Austrian Field Marshall Joseph Radetzky did something no one had done before: He bombed a city from the air.

His target was Venice, then in rebellion against the Habsburg crown. During the siege, he launched a fleet of unmanned linen balloons, carrying bombs made from canister shot and gunpowder, timed to drop over the besieged city.

Radetzky told Emperor Franz Joseph that the effect on the people of Venice was “frightful.” Indeed, Radetzky’s balloons had done little physical damage, but had a substantial effect on the morale of the city’s defenders. As the 19th century wore on, fear of attack by airships became a constant theme in popular literature. By World War I, the mere mention of the word “Zeppelin” was enough to cause panic in the streets of London.

Jan 23 16:07

Press Rebellion in the UK – British Media Launches Protest Against Spying, as GCHQ Places Investigative Journalism in Same Category as Terrorism

Go ahead and read that last paragraph again. In some respects,terrorists are viewed as a lower priority than investigative journalists by the GCHQ. More proof that the “war on terror” is a total sham, and that governments around the world see transparency, truth and their own citizenry as the real enemies.

This is precisely why UK Prime Minister David Cameron wasted no time in exploiting the tragic attacks in Paris in order to call for a banning of encryption, i.e., private communications.

Jan 23 15:58

Adobe fixes just one of two actively exploited zero-day vulnerabilities in Flash Player

Kafeine has since updated his blog post to reflect that the Angler exploit seen yesterday also works against the newly released Flash Player 16.0.0.287 for Windows and Mac. Moreover, the attackers have since corrected an error in their implementation and are now also targeting Firefox users who have Flash Player installed in addition to Internet Explorer users.

"Any version of Internet Explorer or Firefox with any version of Windows will get owned if Flash up to 16.0.0.287 (included) is installed and enabled," Kafeine said. Google Chrome, where Flash Player runs under the browser's security sandbox, is not targeted.

Jan 23 15:52

Fighting Back Against the Surveillance State: Turn Off the NSA's Resources

Thanks to whistleblower Edward Snowden, it is now widely known that the National Security Agency (NSA) has been trampling on the privacy of not only Americans, but pretty much everyone on the planet via mass surveillance for who knows how long.

But even the strongest and largest of villains inevitably have a weak spot - an Achilles' Heel - and the surveillance state is no exception.

OffNow.org has discovered a way to fight back and hit 'em where it hurts.

Jan 23 14:33

Suddenly 2015 feels a whole lot like the delusional financial euphoria we saw before the dot-com crash

The media will never tell you a crash is coming, even when it's imminent

Jan 23 14:23

New Indie Video Game Allows You to Play as a Mass Murdering Psychopath

you play a psychopathic killer who goes on a rampage to kill as many people as possible. And that’s pretty much it.

Jan 23 12:28

The Sorry State of In-Flight Wi-Fi

I’ve finally found something on commercial flights that’s worse than airplane food: the Wi-Fi. It’s so slow and unreliable that it shouldn’t be allowed to call itself “Wi-Fi.” Renaming it Airplane Dial-Up would be unfair to dial-up.

Jan 23 10:07

How Covert Agents Infiltrate the Internet to Manipulate, Deceive, and Destroy Reputations

Among the core self-identified purposes of JTRIG are two tactics: (1) to inject all sorts of false material onto the internet in order to destroy the reputation of its targets; and (2) to use social sciences and other techniques to manipulate online discourse and activism to generate outcomes it considers desirable. To see how extremist these programs are, just consider the tactics they boast of using to achieve those ends: “false flag operations” (posting material to the internet and falsely attributing it to someone else), fake victim blog posts (pretending to be a victim of the individual whose reputation they want to destroy), and posting “negative information” on various forums.

Jan 23 09:40

Top Google executive predicts end of the internet

At the World Economic Forum in Davos, Switzerland, Google guru Eric Schmidt gave an answer regarding the evolution of the web. “I will answer very simply that the internet will disappear,” Schmidt said on Thursday.

“There will be so many IP addresses, … so many devices, sensors, things that you are wearing, things that you are interacting with that you won’t even sense it, it will be part of your presence all the time,” he explained. “Imagine you walk into a room, and the room is dynamic. And with your permission and all of that, you are interacting with the things going on in the room.”

Webmaster's Commentary: 

The internet that Schmidt wants to go away is the internet that improves person-to-person communications, where we can share the wrongdoings of governments and corporations. The "Dynamic" room model is all about dazzling us with new toys to keep us from looking into the wider outside world and looking carefully at what is going on.

Jan 23 08:40

Top Google executive predicts end of the internet

"I will answer very simply that the internet will disappear"

Jan 23 07:54

Transhumanism: The Anti-Human ‘Singularity’ Agenda

At a TED-like techno-geek symposium in the 2014 film Transcendence, Artificial Intelligence guru Dr. Will Caster (Johnny Depp) is asked by an audience member, “So you want to create your own god?” And he answers, “Isn’t that what man has always done?”

This smarmy remark is indicative of the hubris and arrogance of scientism, the belief that science can solve all the problems on this planet, while scientists can have fun playing god at the same time.

It could also have been the answer of Real-Life Techno-Wizard Ray Kurzweil, Google’s Director of Engineering, whose book The Singularity is Near: When Humans Transcend Biology (2005), is ever so popular with scientific materialists who neither have the capacity nor the desire for spiritual evolution, but have a fervent belief that the shotgun marriage of man and machine is not only “normal” but something to be ardently pursued.

Jan 23 07:41

VIDEO: DARPA’S ATLAS GETS A HUGE UPGRADE, PREPARES TO ‘CUT THE CORD’

ATLAS, the standard-bearer for the next generation of robotics, is back and better than ever. In fact, it’s fully 75% better than ever, as the newest version of Google and Boston Dynamics’ humanoid robot carries over only a quarter of its parts from earlier prototypes. Everything from the battery pack to the arm strength has been upgraded, and not just for the sake of it — DARPA is getting ready to have ATLAS “cut the cord,” along with the rest of the competitors in its challenge in robot AI. Soon enough, ATLAS will be stomping through simulated “disaster” (combat) zones to “save” (neutralize) “civilians” (whomever) with total autonomy, and with no tether to undo a fall.

Jan 22 23:17

US Spying in Germany – With Friends Like These, Who Needs Enemies?

A German spy employed by Bundesnachrichtendienst (BND) was arrested in Berlin in early July 2014. He was charged with handing out the top secret documents to foreign secret services, namely the CIA. A few days later it was announced that German law enforcement agencies began searching for another US spy that had been stealing information from The Federal Ministry of Defence.

The general secretary of the Social Democratic Party (SPD) Yasmin Fahimi called for the adoption of a list of “effective countermeasures” that would allow Germany to protect its national secrets from being stolen by Washington. Speaking on national TV Yasmin Fahimi said that: “We are not yet another banana republic.”

Jan 22 16:44

Microsoft HoloLens: An experience you never knew you wanted

WEBMASTER ADDITION: Now THIS interests me a lot more than Google Glass did!

Jan 22 16:16

Journalist Barrett Brown Sentenced to 63 Months in Prison; Read his Speech Here

Justin King
Activist Post

Persecuted journalist Barrett Brown plans to use his opportunity to address the court at his sentencing to continue to defend his colleagues that are also being persecuted. The government extorted a guilty plea from him by threatening 105 years in prison: he’s currently facing around eight. All indications are that he signed a non-cooperating plea deal in which he admits only his role.

As Barrett Brown joins the ranks of America’s other political prisoners, the American people need to review his words and ask themselves if this is actually the government they want. Do they want to live in a society where journalists are targeted by federal agents simply because they revealed the truth? A society where the government exercises so much control over the corporate media, that the fifth estate remains silent, while one of their own is carted off to prison?

There isn’t much that can be added to Brown’s statement...

Jan 22 16:05

Sony hack: One Direction, David Bowie, Adele and more threatened as hackers 'plan to leak personal emails'

One Direction, David Bowie and Adele were last night bracing themselves for embarrassing details being leaked online after North Korean hackers threatened to publish a string of emails.

Why would North Korean hackers feel the need to threaten to leak the data? Its content is of no consequence to them. They can't financially benefit from it, and they would probably suffer a severe case of lead poisoning for giving advanced notice of the leak. The words "inside job" spring to mind.

Jan 22 13:46

BOMBSHELL: IRS Has Active Contract For MILLIONS With Company HHS FIRED Over Botched Healthcare.gov

Seven months after federal officials fired CGI Federal for its botched work on Obamacare website Healthcare.gov, the IRS awarded the same company a $4.5 million IT contract for its new Obamacare tax program.

Webmaster's Commentary: 

Adding insult to injury!

Jan 22 13:37

How Obama's Hacking Laws Could Make You a Criminal

Computer-security researchers fear President Barack Obama’s proposed changes to federal hacking laws could put them out of business, could make computers less secure overall, and could put some of them — and maybe even you — in prison.

"Under the new proposal, sharing your HBO GO password with a friend would be a felony," Nate Cardozo, an attorney with the Electronic Frontier Foundation in San Francisco, told an audience of researchers and IT pros Saturday (Jan. 17) at ShmooCon 2015, a security conference held annually in Washington, D.C.

Obama showcased the proposals in his State of the Union address Wednesday night (Jan. 20). The changes to the Computer Fraud and Abuse Act (CFAA), first implemented in 1984, might make many commonplace security-research practices — and media reporting on those practices — federal crimes. Even sharing passwords for online accounts would potentially be punishable.

Jan 22 13:34

The Hidden Threat To Free Speech in Obama’s State of the Union Address

President Obama proposed new laws to protect Americans and “especially our kids” from hackers during his State of the Union address. Swaddled in that almost tender-sounding language, though, was a plan that would strengthen the government’s ability to go after journalists like Barrett Brown.

In fact, the new cybersecurity legislation would further criminalize the kind of activity for which Brown is due to be sentenced in Dallas federal court on Jan. 22. Judge Sam A. Lindsay will decide whether to let Brown, 33, off with time served for the more than two years he’s already spent behind bars, or imprison him for a maximum of eight-and-a-half years. Brown struck a deal to plead guilty to, among other charges, a Computer Fraud and Abuse Act (CFAA) felony.

Jan 22 13:01

Joint Chiefs Chairman: Congress Must Pass Obama’s Cyber Bill

Even though the new Obama cybersecurity bill (itself mostly a copy of the failed CISPA bill) centers on civilian Internet infrastructure and giving the government easier access to individual Americans’ personal data, the Pentagon is finding ways to make it all about them.

Jan 22 12:44

'Whistleblowers persecuted & prosecuted for exposing illegality' - Snowden's lawyer

Jesselyn Radack, 2011 Sam Adams Award winner & the attorney of Edward Snowden & Bill Binney, tells about her experience.

Jan 22 12:42

New Facebook feature flags fake news

You've seen them in your feed: false reports of celebrity deaths, conspiracy theories presented as real news, promises of free iPads if you share a link, quotes attributed to the Pope that he never said.

Webmaster's Commentary: 

Note the inclusion of "conspiracy theories". Facebook is providing a button where anyone can flag a story as a hoax to get it banned. This gives the "megaphonies" the ability to silence any and all criticisms of Israel, with no recourse by the original poster.

We need a new censorship-free social media platform!

Jan 22 12:16

Thomas Drake - ‘US unchained itself from rule of law’ – 2011 Sam Adams Award winner

2011 Sam Adams Award winner Thomas Drake on the history of (NSA) whistleblowing and US security failures

Jan 22 09:01

Four and Counting: States Consider Bill to Turn Off Resources to the NSA

Activist Post

State efforts to stop warrantless NSA spying are off to a fast start in the 2015 legislative session.

Just two weeks into this year's legislative season, and with many legislatures not even in session yet, legislators in four states have already introduced bills to ban material support or resources to any federal agency engaged in warrantless spying.

These bills not only support efforts to turn off NSA’s water in Utah, but would also have practical effects on federal surveillance programs if passed...

Jan 22 08:37

OAKLAND POLICE PROVIDE PROOF THAT LICENSE PLATE READERS ARE CREATING A DATABASE OF AMERICANS

Since May 2013, EFF and the ACLU have been engaged in a legal battle with two Los Angeles law enforcement agencies who are refusing to hand over a week’s worth of ALPR data. San Diego County, another jurisdiction, has fought efforts by citizens to obtain access to data that law enforcement has collected on them using ALPRs. Both claim that the records are exempted under the California Public Records Act because they are records of law enforcement investigations. The agencies also argue the public interest in maintaining secrecy in ALPR data outweighs the public interest in learning how and where ALPR systems are being used.

Jan 22 08:22

EUROPOL 'TO BE GIVEN NEW INTERNET WATCHDOG POWERS

'
The EU is planning to give Europe’s police intelligence agency, Europol, new powers to become a European internet watchdog and censor, according to a secret policy document. The measures also include controls to have internet content removed as a key part of a Europe-wide response to terrorism after the Paris attacks two weeks ago.

Jan 22 08:21

EU WANTS INTERNET FIRMS TO HAND OVER ENCRYPTION KEYS

A top EU official wants internet and telecommunication companies to hand over encryption keys to police and spy agencies as part of a wider crackdown on terrorism. The EU’s counter-terrorism co-ordinator Gilles de Kerchove, in a document leaked by London-based civil liberties group Statewatch, says the European Commission should come up with rules that require the firms to help national governments snoop on possible suspects.

Jan 21 18:27

Sky blocks internet porn - now will rivals follow? Provider set to make family-friendly filter default unless customers choose to 'opt in'

Sky becomes the first major company to take the step, which was welcomed by child safety experts last night.

But pressure is now mounting on other major internet providers such as BT – which has twice as many broadband customers as Sky – and Virgin Media to adopt the same ‘family-friendly’ approach.

At present, these companies give customers the option of a filter – but do not impose one automatically.

Jan 21 16:43

Windows 10 will be a free upgrade for Windows 7 and 8.1 users

Backdoors are also free.

Jan 21 16:40

NSA secretly uses scapegoats, data mules and innocent victims' PCs for botnets

Besides the NSA being in North Korean systems but not warning Sony about the attack, leaked documents indicate that the NSA covertly uses innocent victims’ infected PCs when hijacking botnets, secretly redirects blame to scapegoats as well as taps into 'unwitting data mules' to pass along exfiltrated information.

Jan 21 16:15

Edward Snowden shuns iPhones due to secret software that can be remotely activated to spy on people, says lawyer

The iPhone has secret spyware that lets governments watch users without their knowledge, according to Edward Snowden's lawyer.

Jan 21 12:54

Health care website has leaks

The government's health insurance website is quietly passing along consumers' personal data to outside websites, just as President Barack Obama is calling for stronger cybersecurity protections.

It works like this: When you apply for coverage on HealthCare.gov, dozens of data companies may be able to tell that you are on the site. Some can even glean details such as your age, income, ZIP code, whether you smoke or if you are pregnant.

HealthCare.gov contains embedded connections to multiple data firms that the administration says generate analysis to improve the consumer experience. Officials say outside firms are barred from using the data to further their own business interests.

Still, ever-evolving technology allows for individual Internet users to be tracked, building profiles coveted by advertisers.

Jan 21 12:00

My Brush with French (and World) “Press Freedom”

Later in the month, I had the opportunity to take my first river cruise in Europe, on the Saone and Rhone Rivers in the south of France. I took my laptop with me to avail myself of the WiFi service that was available on the cruise boat.

I was still a bit excited about our success with the video and eager, should the opportunity arise, to share it with anyone I thought might be interested. The WiFi worked quite well generally, but when I attempted to view “Falling to Pieces for Israel,” I was greeted with this message: “This video is not available in your country.” At no time when I was in France was I able to see it.

Webmaster's Commentary: 

Read further down about how Kindle deletes books you have bought if the local government bans them. Good reason to go back to paper and ink books if you want to protect yourself from censorship!

Jan 21 11:40

Here's What Concerns Experts About Obama's State of the Union Cybersecurity Goals

Central to the problems with the recommended updates to the Computer Fraud and Abuse Act (CFAA) are vague terms that could easily be interpreted to prosecute innocents, no matter how weak their links to actual criminal activity. Anyone who "intentionally exceeds authorized access to a protected computer, and thereby obtains information from such computer" could be charged. That sounds acceptable on first inspection, but the definition of "exceeds authorized access" includes using a computer with proper authorization "to obtain or alter information" the relevant party is not entitled to look at, "or for a purpose that the accesser knows is not authorized by the computer owner".

Webmaster's Commentary: 

Or for that matter any of the Edward Snowden documents published in the European media.

Jan 21 10:14

PROJECT AURORAGOLD – THE US GOVERNMENT’S OWN HACKING OPERATION

There’s been an undeniable overload of information released by Edward Snowden since his rendition of “The Transported Man” back in May 2013. As we are now in 2015 the faucet of documents is still turned on. As if the NSA hasn’t already been pants’d enough, the last few months proves, yet again, that enough is never enough.

Jan 21 09:49

Facebook to hammer ‘satirical’ and ‘fake news’ stories

Facebook clamps-down on 'hoaxes'

Jan 21 09:35

The FCC's possible reclassification of ISPs signals hope for net neutrality

In January 2014, the FCC's net neutrality directives were struck down in the US Court of Appeals, a ruling that was expected because in 2002, the FCC reclassified ISPs as "information services," which prevents the agency from exerting much control over the infrastructure that powers these networks.

FCC Chairman Thomas Wheeler indicated that the agency will hold a vote on February 26, 2015, which is likely to return ISPs to being "telecommunication services" under Title II of the Communications Act of 1934. This will provide the FCC the legal authority to open access to utility poles to any interested company to build internet infrastructure, as well as prevent ISPs from throttling speeds from any remote servers, or prioritizing speeds from others in exchange for payment.

Jan 21 08:43

Google Maps Engine could be quietly coming to a halt soon

UPDATED: A Google spokesperson confirmed Maps Engine support will end on January 29, 2016.

Jan 21 07:26

Government Agency Classifies Journalists with Terrorists

Derrick Broze
Activist Post

New revelations from documents released by whistleblower Edward Snowden indicate the British Government Communications Headquarters (GCHQ) classifies investigative journalists as a threat, similar to terrorists and hackers.

The Guardian reported on the program which monitored emails to and from journalists working for media organizations in the U.S. and the UK. In one single day, in less than 10 minutes, the GCHQ collected 70,000 emails, including emails of journalists with the BBC, Reuters, the Guardian, the New York Times, the Sun, NBC, and the Washington Post. The emails were collected through the GCHQ accessing the fiber-optic cables known as “the backbone of the internet.” The communications were then shared with staff on the agencies intranet...

Jan 20 20:30

Google aboard as Musk`s SpaceX gets $1 bn in funding

he private space exploration firm SpaceX said Tuesday it had secured a $1 billion investment that could help founder Elon Musk`s plan to build a satellite Internet network.

The latest round of funding comes from Google and the financial firm Fidelity, which will own some 10 percent of the company.

Jan 20 16:18

Young people 'ready to ditch passwords for biometric security'

Of the biometric payment methods available to consumers, 16- to 24-year-olds are most keen on verification via fingerprint scanning, with 70 per cent predicting that this will be the primary form of identification by 2020.

Other methods of interest to this generation include retina scans (39pc) and facial recognition (27pc), though voice recognition (12pc), fast DNA samples (15pc) and implanted chips (16pc) remain less popular at present.

Jan 20 16:15

Sky to block pornography by default to protect children

Broadband provider Sky will block adult content by default, unless users opt out, it has revealed.

The decision was announced in a blog post and will be phased in over coming weeks.

In 2013 Prime Minister David Cameron put pressure on internet service provider [ISPs] to make online filtering mandatory, saying it was the best way to protect children.

His request caused controversy among politicians and the internet industry.

Since then most of the UK's ISPs have offered filtering software for parents concerned about what their children may be able to access online but few have offered this by default, opting instead to allow parents or other customers to turn the filters on if they want them.

Jan 20 16:07

You’ll Never Guess Who’s Trying to Hack Your iPhone

The FBI wants to search through your electronic life. You may think it’s a given that the government is in the business of collecting everyone’s personal data — Big Brother run amok in defiance of the Constitution. But under the limits of the Fourth Amendment, nothing it finds can be used to prosecute its targets. Now the FBI is taking steps to carry out broad searches and data collection under the color of authority, making all of us more vulnerable to “fishing expeditions.”

Jan 20 15:56

What David Cameron just proposed would endanger every Briton and destroy the IT industry

This, then, is what David Cameron is proposing:

* All Britons' communications must be easy for criminals, voyeurs and foreign spies to intercept

* Any firms within reach of the UK government must be banned from producing secure software

* All major code repositories, such as Github and Sourceforge, must be blocked

* Search engines must not answer queries about web-pages that carry secure software

* Virtually all academic security work in the UK must cease -- security research must only take place in proprietary research environments where there is no onus to publish one's findings, such as industry R&D and the security services

* All packets in and out of the country, and within the country, must be subject to Chinese-style deep-packet inspection and any packets that appear to originate from secure software must be dropped

* Existing walled gardens (like Ios and games consoles) must be ordered to ban their users from installing secure software

Jan 20 12:20

GCHQ captured emails of journalists from top international media

New evidence from other UK intelligence documents revealed by Snowden also shows that a GCHQ information security assessment listed “investigative journalists” as a threat in a hierarchy alongside terrorists or hackers.

Senior editors and lawyers in the UK have called for the urgent introduction of a freedom of expression law amid growing concern over safeguards proposed by ministers to meet concerns over the police use of surveillance powers linked to the Regulation of Investigatory Powers Act 2000 (Ripa).

More than 100 editors, including those from all the national newspapers, have signed a letter, coordinated by the Society of Editors and Press Gazette, to the UK prime minister, David Cameron, protesting at snooping on journalists’ communications.

Jan 20 09:34

The Digital Arms Race: NSA Preps America for Future Battle

Normally, internship applicants need to have polished resumes, with volunteer work on social projects considered a plus. But at Politerain, the job posting calls for candidates with significantly different skill sets. We are, the ad says, "looking for interns who want to break things."

Webmaster's Commentary: 

The links in red go to PDF files of US documents regarding the scope of cyber-warfare planned by the US Government.

Jan 20 08:50

Turkey arrests 23 in wire-tapping scandal

Turkey has arrested 23 people for wire-tapping senior government officials including President Recep Tayyip Erdogan.

Police launched raids in the capital Ankara and three other cities early Tuesday, arresting some 23 people suspected of illegally eavesdropping on senior government officials.

The state-run Anadolu news agency said the suspects are linked to Turkey's telecommunications authority and its research center. They are suspected of wiretapping phones, including encrypted ones used by President Recep Tayyip Erdogan and other senior officials.

Jan 20 06:22

Third-party connections prompt more privacy concerns about ObamaCare site

WASHINGTON – A little-known side to the government's health insurance website is prompting renewed concerns about privacy, just as the White House is calling for stronger cybersecurity protections for consumers.

It works like this: When you apply for coverage on HealthCare.gov, dozens of data companies may be able to tell that you are on the site. Some can even glean details such as your age, income, ZIP code, whether you smoke or if you are pregnant.

Jan 20 02:15

Think It All Started with Phones and Email? The NSA Used to Copy Our Telegrams

That’s right, folks: the NSA was systematically intercepting our telegrams all the way back in the 1960s.

One has to wonder: had the NSA been around in the days of communication by carrier pigeon, would we have found a government fort filled to the brim with dead birds and scrawled notes somewhere or what?

Jan 19 18:22

British intelligence intercepted emails from The New York Times, Reuters, BBC, and others

Newly released Snowden documents show GCHQ was listening in the internal communications of some of the most prestigious journalistic institutions in the world. A report in The Guardian details a test exercise that resulted in emails from BBC, Reuters, The Guardian, The New York Times, Le Monde, The Sun, NBC, and The Washington Post all being deposited onto GCHQ's internal intranet, available to anyone logged into the system. It does not appear to have been an intelligence gathering exercise, and the resulting emails don't seem to have targeted any sensitive stories, but it still represents a major privacy violation and a reminder of how easily bulk collection systems can be abused.

Jan 19 18:21

Malvertising Campaign exploited Google AdWords advertising

Malvertising campaigns are one of privileged attack vector exploited by criminal crews, their efficiency depends on the ability of attackers to compromise large audience channels. In September 2014 Malwarebytes firm discovered a large scale malvertising campaign exploiting Google’s DoubleClick and popular Zedo advertising agency to deliver malicious ad, while earlier 2015 security company Cyphort has discovered another malvertising campaign that targeted several websites via AOL Ad-Network, including the Huffington Post.

Jan 19 18:16

Lizard Squad’s Plaintext Customer List Leaked As Another Member Is Arrested

The Lizard Squad, the group of hackers credited with taking down Xbox Live and PSN over the holiday, have been compromised and much of their data leaked. Brian Krebs received a listing of the Lizard Squad’s LizardStresser customer database and noted that the group made about $11,000 in bitcoin serving up denial-of-service on demand.

At the same time police arrested an alleged member of the group, Jordan Lee-Bevan aka EvilJordie.

The Lizard Squad’s LizardStresser site had 14,241 users but only a few hundred funded accounts and performed an equal number of attacks (including shutting down Krebs’ own site).

Jan 19 15:46

Google will review Europe-only policy for ‘right to be forgotten’

Google is only removing search results from European websites when individuals invoke their “right to be forgotten”, contrary to regulators’ guidelines, but will review that approach soon, the company’s chief legal officer said on Monday.

Jan 19 10:43

‘Cyber Snipers’: Snowden uncovers truth on US digital war plans

America gearing up for digital war according to documents leaked by Snowden and released by der Spiegel magazine

Jan 19 10:34

Lizard Squad's paid cyberattack service faces a hack of its own

Lizard Squad is apparently getting a taste of its own medicine. Security guru Brian Krebs has learned that someone hacked Lizard Stresser, the cyberattack-for-hire service that Lizard Squad launched following its takedowns of the PlayStation Network and Xbox Live. The breach exposed the project's customer database, which was ironically stored in plain text -- unless clients change their passwords, they're about as vulnerable as the sites they paid to take down.

Jan 19 08:58

Insurance trackers 'could leave car vulnerable to hijack'

Tiny devices given to drivers by insurance companies to track driving habits are “insecure” and could allow a hacker to hijack cars, including steering and braking systems, warns a security researcher

Jan 19 08:22

The Digital Arms Race: NSA Preps America for Future Battle

The NSA's mass surveillance is just the beginning. Documents from Edward Snowden show that the intelligence agency is arming America for future digital wars -- a struggle for control of the Internet that is already well underway.

Jan 19 08:00

NSA Cyber War Will Use Internet of Things as Weapons Platform; Your Home is the Battlefield

Daniel Taylor
Activist Post

“World War III is a guerrilla information war with no division between military and civilian participation.” – Marshall McLuhan, Culture is Our Business, 1970

New Snowden documents recently revealed that the NSA is getting ready for future digital wars as the agency postures itself in an aggressive manner towards the world. "The Five Eyes Alliance," a cooperation between United States, Canada, Britain, Australia, and New Zealand, is working hard to develop these weapons of Cyber Warfare...

Jan 19 07:32

N.S.A. BREACHED NORTH KOREAN NETWORKS BEFORE SONY ATTACK, OFFICIALS SAY

The trail that led American officials to blame North Korea for the destructive cyberattack on Sony Pictures Entertainment in November winds back to 2010, when the National Security Agency scrambled to break into the computer systems of a country considered one of the most impenetrable targets on earth.

SHARE THIS ARTICLE WITH YOUR SOCIAL MEDIA